Poisoning Attacks on Learning-Based Keystroke Authentication and a Residue Feature Based Defense

作者: Zibo Wang

DOI:

关键词:

摘要:

参考文章(31)
John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson, None, I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves financial cryptography. pp. 1- 16 ,(2013) , 10.1007/978-3-642-41320-9_1
Blair C. Armstrong, Maria V. Ruiz-Blondet, Negin Khalifian, Kenneth J. Kurtz, Zhanpeng Jin, Sarah Laszlo, Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics Neurocomputing. ,vol. 166, pp. 59- 67 ,(2015) , 10.1016/J.NEUCOM.2015.04.025
Mark A. Przybocki, Douglas A. Reynolds, Alvin F. Martin, George R. Doddington, Walter Liggett, Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation conference of the international speech communication association. ,(1998)
Yinglian Xie, Qifa Ke, Eliot Gillum, Yuan Yu, Yan Chen, Fang Yu, Yao Zhao, BotGraph: large scale spamming botnet detection networked systems design and implementation. pp. 321- 334 ,(2009)
Francesco Bergadano, Daniele Gunetti, Claudia Picardi, User authentication through keystroke dynamics ACM Transactions on Information and System Security. ,vol. 5, pp. 367- 397 ,(2002) , 10.1145/581271.581272
Zibo Wang, Abdul Serwadda, Kiran S Balagani, Vir V Phoha, None, Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks international conference on biometrics theory applications and systems. pp. 289- 296 ,(2012) , 10.1109/BTAS.2012.6374591
Benjamin I.P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar, ANTIDOTE Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference - IMC '09. pp. 1- 14 ,(2009) , 10.1145/1644893.1644895
Jessica Fridrich, Jan Kodovsky, Rich Models for Steganalysis of Digital Images IEEE Transactions on Information Forensics and Security. ,vol. 7, pp. 868- 882 ,(2012) , 10.1109/TIFS.2012.2190402
Fabian Monrose, Michael K. Reiter, Susanne Wetzel, Password hardening based on keystroke dynamics computer and communications security. pp. 73- 82 ,(1999) , 10.1145/319709.319720
Emanuele Maiorana, Gabriel E. Hine, Patrizio Campisi, Hill-climbing attack: Parametric optimization and possible countermeasures. An application to on-line signature recognition international conference on biometrics. pp. 1- 6 ,(2013) , 10.1109/ICB.2013.6612961